Course info

Rating

(397)

Level

Beginner

Updated

Dec 4, 2015

Duration

1h 2m

Description

In this Play by Play, Troy Hunt will show how easy it is for a victim to fall prey to an attack. When all is said and done, you should understand how important it is to be prepared for these attacks and know the right steps to mitigate them in the first place.

About the author

Troy Hunt is a Microsoft Regional Director and MVP for Developer Security. He's a regular conference speaker, frequent blogger at troyhunt.com and is the creator of the data breach notification service known as “Have I Been Pwned”.

Section Introduction Transcripts

Course OverviewWelcome, and I'm Gary Eimerman, and this is Play by Play at Pluralsight. This is a series where we give you a rare view into the workflows and thought process of top admins, developers, and designers. Have you ever wished you could watch one of your tech heroes work on a project on their own time, using their own tools, at their natural speed? Not a rehearsed presentation or a prepared course, but planning and problem solving as it happens in the real world every day. That's what we do in this series. We give talented admins, developers, and designers a task to work on, live and unrehearsed, for about 2 hours. We talk through architecture decisions and fix unexpected problems. This isn't a tutorial. We won't pause to explain how to set up server infrastructure or development environment, but you will see how professionals use tools in their everyday environments. In this session, I have the great pleasure to sit down with security expert and Microsoft MVP Troy Hunt. We discuss some ethical hacking techniques with Troy as he shares with us some very easy exploits and how to address them in our environments. We hope you can learn from some of these techniques to help secure your own environments.